FOMO DailyFOMO DailyFOMO Daily
Font ResizerAa
  • Home
  • News
  • Politics
  • Entertainment
  • Sport
  • Lifestyle
  • Finance
  • Cryptocurrency
Reading: AI Companies Leak Sensitive Data in GitHub Repositories, Says Wiz
Share
Font ResizerAa
FOMO DailyFOMO Daily
  • Home
  • News
  • Politics
  • Entertainment
  • Sport
  • Lifestyle
  • Finance
  • Cryptocurrency
Search
  • Home
  • News
  • Politics
  • Entertainment
  • Sport
  • Lifestyle
  • Finance
  • Cryptocurrency
Copyright © 2026 FOMO Daily - All Rights Reserved.

AI Companies Leak Sensitive Data in GitHub Repositories, Says Wiz

How rapid AI innovation is outpacing cybersecurity — and what leaders must do before the next leak.

Miles Rowan
Last updated: November 12, 2025 10:50 pm
Miles Rowan
4 Min Read
Share
4 Min Read

A new cybersecurity study published by Wiz has found that the majority of the world’s top artificial intelligence companies are inadvertently exposing confidential information online, underscoring a growing disconnect between rapid innovation and basic security discipline.

According to the report, 65% of the 50 leading AI companies analyzed had leaked verified secrets on GitHub, including API keys, authentication tokens, and other sensitive credentials. Many of these exposures were buried deep within repositories or deleted forks areas rarely examined by standard scanning tools.

A Preventable Error

According to Glyn Morgan, the Country Manager for the UK & Ireland at Salt Security, the trend is both “glaring and avoidable.”

“When AI companies inadvertently leak their API keys, it points to a fundamental failure in governance and configuration,” he said. “It hands attackers a direct route into systems, models, and data while bypassing the usual defensive layers.”

The Wiz research underlines that these security oversights are far from isolated developer mistakes. As enterprises increasingly partner with AI startups, they become quite exposed to the same kinds of vulnerabilities. Several of the leaks, the report warns, could have exposed private models, organizational structures, and even training data, potentially compromising competitive advantage and intellectual property.

The stakes are high: affected companies collectively have a market valuation of over $400 billion.

Real-World Examples
The study enumerates several examples of exposed secrets:
• LangChain was leaking various LangSmith API keys, including those with permissions to manage organizational members.

• An enterprise-tier ElevenLabs API key was found inside a plaintext file.

• One company from the Forbes AI 50 had an exposed Hugging Face token in a deleted fork, which allowed access to about 1,000 private models. That same company also leaked Weights & Biases keys, exposing data linked to model training.

Hidden Dangers Below the Surface

Traditional code scanning is missing such exposures, according to Wiz, because it is focused narrowly on public repositories. To find deeper vulnerabilities, its researchers adopted a three-dimensional approach they call Depth, Perimeter, and Coverage.

Depth: full commit histories, deleted forks, workflow logs, and gists are reviewed places standard scanners normally don’t look.

• Perimeter expanded the search beyond company repositories to include employees and contributors, who may unwittingly commit secrets to personal projects.

• Coverage sought AI-specific secret types like Weights & Biases, Groq, and Perplexity keys, which conventional tools usually tend to miss.

It appears from the results that the development pace of the AI sector has outpaced its security maturity. Nearly half of Wiz’s attempts at responsible disclosure either received no response or failed to reach the correct contacts, pointing to significant gaps in the vulnerability reporting and response procedures.
What Firms Should Do Now

Wiz enumerates three urgent steps for security leaders:

1. Consider all developers and contributors part of the attack surface. Implement the most stringent policies and procedures when onboarding them, including multi-factor authentication and explicit separation of personal versus professional use of GitHub.

2. Modernize internal secret-scanning practices. Go beyond simple repository checks and adopt comprehensive scans that mirror the Depth-Perimeter-Coverage approach.

3. Extend due diligence to third-party vendors. CISOs should review how AI partners manage credentials and disclosures before integrating their tools. Speed versus Security The report concludes that the very speed driving AI breakthroughs now poses one of the industry’s greatest security threats. As Wiz cautions, “For AI innovators, the message is clear: speed cannot come at the expense of security” a warning extending equally to the enterprises depending on them.

Russian Wallets Use USDT to Move $8 Billion
CBDCs Exploring the Future of Money
DeFi Technologies Lawsuit Signals Major Shift for Crypto Companies
Fractional NFTs make owning art easy
Binance Faces Heat in France

Sign up to FOMO Daily

Get the latest breaking news & weekly roundup, delivered straight to your inbox.

By signing up, you acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Whatsapp Whatsapp LinkedIn Reddit Telegram Threads Bluesky Email Copy Link Print
ByMiles Rowan
Follow:
A political and culture reporter covering the stories shaping today’s national conversation. With a focus on government policy, elections, and social movements, delivers in-depth analysis and reporting that helps readers understand how power and people intersect. Known for thoughtful journalism and a clear, engaging writing style, provides accurate, trustworthy news that informs and inspires.
Previous Article White House Signals Trump Will Sign Bill to End Government Shutdown
Next Article A Self-Inflicted Crisis at No. 10

Latest News

Bitcoin Died Four Times in 2025 — But a Hidden Infrastructure Boom Proves the Skeptics Completely Wrong
Finance News
Bitcoin Long-Term Holders Just Stopped Selling But a Broken Chart Signal Hides the Truth
War News
Ethereum Sacrificed $100 Million in Revenue to Accelerate Network Growth
Cryptocurrency Finance News
XRP on Exchanges Hits 8-Year Low But Historical Data Exposes a Brutal Flaw in the Popular Moon Narrative
Cryptocurrency Finance News
Crypto Hacks Dropped by Half in 2025 But the Data Reveals a Much Deadlier Financial Threat
War News
Happy New Year from FOMO Daily News 🎉
War News
Robotics: The Next Frontier of Decentralized Intelligence
Finance News Technology
Margin Shock Hits Traders as Silver Market Turmoil Unfolds!
War News
Bitmain Just Slashed Mining Rig Prices Proving the Market’s Oldest Bitcoin Rule Is Officially Dead
War News
Coinbase Reveals Arrest in the $355 Million Insider Extortion Scheme That Targeted Nearly 70,000 Customers
War News
Ethereum’s 2026 Roadmap Includes a Validator Risk Bigger Than You Think To Deliver Massive Throughput Gains
War News
Asia Is Quietly Building a Counterweight to the Dollar Stablecoin Empire and the West Isn’t Ready
War News
Snoop Dogg’s $1 NFT Drop Shows What NFTs Were Always Meant to Be
Entertainment News Showbiz
From El Salvador to Pakistan: How Governments Reshaped Crypto in 2025
Finance News

You Might Also Like

Are Korean Retail Traders Propping Up ETH Treasuries?

October 7, 2025

Universal NFTs: Simple, Seamless Digital Ownership now!

October 14, 2025

BitcoinBacked Oil, The Final Frontier of Tokenized Energy

November 7, 2025

China’s $71 Billion Treasury Dump: What It Means for Bitcoin’s Big Story

December 10, 2025

FOMO Daily — delivering the stories, trends, and insights you can’t afford to miss.

We cut through the noise to bring you what’s shaping conversations, driving culture, and defining today — all in one quick, daily read.

  • Privacy Policy
  • Contact
  • Home
  • News
  • Politics
  • Entertainment
  • Sport
  • Lifestyle
  • Finance
  • Cryptocurrency

Subscribe to our newsletter to get the latest articles delivered to your inbox.

FOMO DailyFOMO Daily
Follow US
Copyright © 2026 FOMO Daily. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?